CVE-2025-9232
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-30

Last updated on: 2025-11-04

Assigner: OpenSSL Software Foundation

Description
Issue summary: An application using the OpenSSL HTTP client API functions may trigger an out-of-bounds read if the 'no_proxy' environment variable is set and the host portion of the authority component of the HTTP URL is an IPv6 address. Impact summary: An out-of-bounds read can trigger a crash which leads to Denial of Service for an application. The OpenSSL HTTP client API functions can be used directly by applications but they are also used by the OCSP client functions and CMP (Certificate Management Protocol) client implementation in OpenSSL. However the URLs used by these implementations are unlikely to be controlled by an attacker. In this vulnerable code the out of bounds read can only trigger a crash. Furthermore the vulnerability requires an attacker-controlled URL to be passed from an application to the OpenSSL function and the user has to have a 'no_proxy' environment variable set. For the aforementioned reasons the issue was assessed as Low severity. The vulnerable code was introduced in the following patch releases: 3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the HTTP client implementation is outside the OpenSSL FIPS module boundary.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-30
Last Modified
2025-11-04
Generated
2026-05-06
AI Q&A
2025-09-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
openssl openssl 3.5.4
openssl openssl 3.0.18
openssl openssl 3.2.6
openssl openssl 3.3.5
openssl openssl 1.1.1zd
openssl openssl 3.4.3
openssl openssl 1.0.2zm
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in OpenSSL is caused by a missing terminating NUL byte after a strncpy() call within the use_proxy() function. Because the string is not properly terminated, it can lead to improper string handling, causing an out-of-bounds read when the 'no_proxy' environment variable is set and the HTTP URL contains an IPv6 address. This out-of-bounds read can cause the application to crash. [1, 2, 3, 4, 5]


How can this vulnerability impact me? :

The vulnerability can cause an out-of-bounds read that triggers a crash in the application using the OpenSSL HTTP client API, leading to a Denial of Service (DoS). However, exploitation requires that an attacker controls the URL passed to OpenSSL and that the 'no_proxy' environment variable is set. The severity is assessed as low because the crash is the only impact and some conditions must be met for exploitation.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is triggered when an application using OpenSSL HTTP client API functions has the 'no_proxy' environment variable set and processes an HTTP URL with an IPv6 address in the host portion. Detection would involve checking if the 'no_proxy' environment variable is set and if any application is using a vulnerable OpenSSL version (3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0, or 3.5.0) that uses the HTTP client API. You can check the environment variable with the command `echo $no_proxy` on Unix-like systems. To identify the OpenSSL version, use `openssl version`. Monitoring application crashes or Denial of Service symptoms when processing URLs with IPv6 addresses may also indicate exploitation attempts. However, no specific detection commands or network signatures are provided in the resources.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating OpenSSL to a fixed version where the missing terminating NUL byte issue in the use_proxy() function has been corrected. The fix has been committed in multiple patches (see commits in Resources 1-5). If updating is not immediately possible, avoid setting the 'no_proxy' environment variable or avoid passing URLs with IPv6 addresses in the host portion to OpenSSL HTTP client API functions. Additionally, monitor applications for crashes related to this issue and restrict attacker-controlled URLs where feasible. [1, 2, 3, 4, 5]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart